General

  • Target

    771049ea28dc7d93076d1019ff573d8ad9a8c47ca8dec2a8c64be18aec259d03.exe

  • Size

    521KB

  • Sample

    240701-pz7dmswbmk

  • MD5

    cb45d49e68b2c594f6c9bcf7edd6481a

  • SHA1

    fa05b81dc9b816e4e8dd51349271e8af273b799b

  • SHA256

    771049ea28dc7d93076d1019ff573d8ad9a8c47ca8dec2a8c64be18aec259d03

  • SHA512

    8538a493ead6c65d2aac98c9b56b53b152e0c1699b88b239597ca16173a6980cc862bdba596807d36075befce7a7e6cf8d3baf2218ecd3a0c95e072f594af695

  • SSDEEP

    6144:cTVFZInd6Xcfg9UVFuVqsLSccPNJcnkhcYlEHNLpKJjPh2Lu2GyfyRUoXHO8cZlJ:c5kndm7/L2Pd2WyfyFXH5sJQniP

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    valleycountysar.org
  • Port:
    26
  • Username:
    [email protected]
  • Password:
    fY,FLoadtsiF

Targets

    • Target

      771049ea28dc7d93076d1019ff573d8ad9a8c47ca8dec2a8c64be18aec259d03.exe

    • Size

      521KB

    • MD5

      cb45d49e68b2c594f6c9bcf7edd6481a

    • SHA1

      fa05b81dc9b816e4e8dd51349271e8af273b799b

    • SHA256

      771049ea28dc7d93076d1019ff573d8ad9a8c47ca8dec2a8c64be18aec259d03

    • SHA512

      8538a493ead6c65d2aac98c9b56b53b152e0c1699b88b239597ca16173a6980cc862bdba596807d36075befce7a7e6cf8d3baf2218ecd3a0c95e072f594af695

    • SSDEEP

      6144:cTVFZInd6Xcfg9UVFuVqsLSccPNJcnkhcYlEHNLpKJjPh2Lu2GyfyRUoXHO8cZlJ:c5kndm7/L2Pd2WyfyFXH5sJQniP

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks